Method and system for mobile terminal security authorization
A security and terminal application technology, applied in transmission systems, digital transmission systems, secure communication devices, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0069] Embodiment 1 of the present invention is: a method for security authorization of a mobile terminal, the method is based on the following architecture, including a management terminal, an application terminal, and an authentication center, and the authentication center communicates with the management terminal and the application terminal respectively . Preferably, the management terminal and the application terminal are mobile phones.
[0070] Such as figure 2 As shown, the method includes the following steps:
[0071] S1: The management terminal requests a key from the authentication center.
[0072] S2: The authentication center randomly generates a plaintext and a key, and uses the key to encrypt the plaintext to obtain a ciphertext. Both the plaintext and the key are random numbers generated by the certification center, and then encrypted with an encryption algorithm to obtain ciphertext.
[0073] S3: the authentication center sends the key to the management te...
Embodiment 2
[0084] Please refer to image 3 , this embodiment is a further expansion of Embodiment 1, and the similarities will not be described again. The difference is that after the step S7, the following steps are also included:
[0085] S12: The application terminal sends its serial number and the plaintext and ciphertext obtained from the authentication center to the management terminal.
[0086] S13: The management terminal uses the key to decrypt the ciphertext.
[0087] S14: Determine whether the decrypted plaintext is consistent with the plaintext, that is, determine whether the plaintext obtained by decrypting the ciphertext obtained from the application terminal using the key obtained from the authentication center is consistent with the plaintext obtained from the application terminal, and if so, execute Step S15.
[0088] S15: Save the serial number of the application terminal.
[0089] In this embodiment, the management terminal also saves the serial number of the applic...
Embodiment 3
[0091] Please refer to Figure 5 , this embodiment is a mobile terminal security authorization system corresponding to the above embodiments, including:
[0092] Request module 1, used for the management terminal to request a key from the authentication center;
[0093] Generating module 2, used for the certification center to randomly generate plaintext and key, and use the key to encrypt the plaintext to obtain ciphertext;
[0094] The first sending module 3 is used for the authentication center to send the key to the management terminal, and send the plaintext and ciphertext to the application terminal;
[0095] The second sending module 4 is used for the management terminal to send its serial number and the key to the application terminal;
[0096] The first decryption module 5 is used for the application terminal to receive the serial number of the management terminal and the key, and use the key to decrypt the ciphertext obtained from the certification center;
[0097...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


